Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2024 19:14

General

  • Target

    3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.msi

  • Size

    3.9MB

  • MD5

    54c2f6b177e71ec4c262930566a282d1

  • SHA1

    b39e90c76e1fb6e4dc6f2d4ed034ba7b9c82bf23

  • SHA256

    3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848

  • SHA512

    7b84d5784626707e808bc7a8e0b15fb23f7faf3dc77e3aa720a18e89e494c98850b1b6de52b25f43463e5a39aac2db1edebbd6c891976d89facd1f775cf16e43

  • SSDEEP

    49152:0pUPBhGczyqOSKGLcLxxYuYLRlJ7lzkiBVlR3/BzuAPeJx3B+JLil:0pUqM9LDEKXVuAPMuW

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

rourtmanjsdadhfakja.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    80

  • check_disk

    false

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    eXAWVDek

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Detect DarkGate stealer 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\3ed9bc94879d6db3f296f8b948645a6ea9f9d4201d0209a71fbc62bf73e2e848.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1524
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A73C86D45F91F1B6C9A1C0C053A9DCD0
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1576
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-51f20032-4ca0-49a1-9848-3a7039bb2f2c\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        PID:1972
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        PID:1668
      • C:\Users\Admin\AppData\Local\Temp\MW-51f20032-4ca0-49a1-9848-3a7039bb2f2c\files\iTunesHelper.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-51f20032-4ca0-49a1-9848-3a7039bb2f2c\files\iTunesHelper.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1108
        • \??\c:\temp\Autoit3.exe
          "c:\temp\Autoit3.exe" c:\temp\script.a3x
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          PID:1688
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-51f20032-4ca0-49a1-9848-3a7039bb2f2c\files"
        3⤵
          PID:936
        • C:\Windows\SysWOW64\ICACLS.EXE
          "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-51f20032-4ca0-49a1-9848-3a7039bb2f2c\." /SETINTEGRITYLEVEL (CI)(OI)LOW
          3⤵
          • Modifies file permissions
          PID:1720
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2564
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005C0" "000000000000046C"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2476

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MW-51f20032-4ca0-49a1-9848-3a7039bb2f2c\files.cab

      Filesize

      624KB

      MD5

      dda979f5b563c2cf1fdb681e6e7c9efa

      SHA1

      491f845ac345adf7187229b29d9ba26350c6db33

      SHA256

      5e15ae7e645b2e3c883f6542778ad8227715f408a493e7494e408bde404c604c

      SHA512

      10b5383198b0e2e8d562dd26c969589b5303afb3767403f04f14d008435890a505821f11c7bd050ded446e6f2a1050268c051c793b9378132852863efd4b1ca0

    • C:\Users\Admin\AppData\Local\Temp\MW-51f20032-4ca0-49a1-9848-3a7039bb2f2c\files\CoreFoundation.dll

      Filesize

      1.5MB

      MD5

      2ee6588e1b56c9ee9170ea76386345c9

      SHA1

      8ee0cba32f5e8d21945f8a425d1cd28acea4b830

      SHA256

      e3c8bc46bf9c21f8fb05ae9342d51c2d44d6462cb888142b77bbeeb1707e682b

      SHA512

      a18157fb3756a41cbcc58b276da996a2c41b13032424a5ece321b8aebb2955499dd2685c727495ead40cea22f22162e6ad94cfa003a476e3f6ace3836a89d9f8

    • C:\Users\Admin\AppData\Local\Temp\MW-51f20032-4ca0-49a1-9848-3a7039bb2f2c\files\iTunesHelper.exe

      Filesize

      358KB

      MD5

      ed6a1c72a75dee15a6fa75873cd64975

      SHA1

      67a15ca72e3156f8be6c46391e184087e47f4a0d

      SHA256

      0d8878cca08903777888b3681f90e4a07c7aef7d9600a67dfa985844d4bf5eda

      SHA512

      256c2ebfeb42c2d3340d8bb423ef0ae48d5fb9fe5ca09c363595f51a03007482b67a777e4cae7a8194f69bc3a3fbcdb9abb5c9f92097925272431bb9d50f5c03

    • C:\Users\Admin\AppData\Local\Temp\MW-51f20032-4ca0-49a1-9848-3a7039bb2f2c\files\sqlite3.dll

      Filesize

      769KB

      MD5

      4e8f370ed0c6feb3c7c6a6f0ccba9ef6

      SHA1

      0421e7b68248b3a77c5d891470016fddbd5ca5b9

      SHA256

      48039b253f286047c46d2284c96fcedcf547c785d79e924998058e52d04520c7

      SHA512

      a08b69af409eac47cf6ec7e08113e6aaff68463209629d6884c22e134ff911bcd6bc159b5e0d154340d4be3ff5d5b2345df12c38414c35c0532e7f37b4d00fe0

    • C:\Users\Admin\AppData\Local\Temp\MW-51f20032-4ca0-49a1-9848-3a7039bb2f2c\msiwrapper.ini

      Filesize

      448B

      MD5

      35ec12e26816177ea7b172513c28057a

      SHA1

      e26e1eb84edb4e6f6701bdfa318b9953bcc52283

      SHA256

      9f4a3099a6805760496ccdc9701bdca0cc4cc8b6b6fe5ea0bad66c8ee3f82325

      SHA512

      bc2cbf62f19a1256cf329055168e5202fdc7c5590d09f8b74e528476a95bcfb4387a60a07efbb807bd29a975f3a4407a2daa344603c1b809401ec719e24fe9e3

    • C:\Users\Admin\AppData\Local\Temp\MW-51f20032-4ca0-49a1-9848-3a7039bb2f2c\msiwrapper.ini

      Filesize

      1KB

      MD5

      1f83cde512957a5d11f37ff8f975fa51

      SHA1

      778b2ecc08aba058f98768fb02ff0a94a0ecee10

      SHA256

      04d95eb6c13ed71960c47fce637b2c3c292ecd610119967f59f11c44ed5c753d

      SHA512

      1468dd04937fedce2d9ec1262eb93fb8476cb18a3c4f15967be7aa5b70c5143883e6a2c800011068b3df1f5c781cd0d8a62ab64a6275aa3cf31b7efadb8ae965

    • C:\Users\Admin\AppData\Local\Temp\MW-51f20032-4ca0-49a1-9848-3a7039bb2f2c\msiwrapper.ini

      Filesize

      1KB

      MD5

      d2e35c136b78a472a49d09be9b80b37c

      SHA1

      13261d7a25cd14b2b9a8124339168ca564ce2f41

      SHA256

      44595efa7bbba41dd6217473a9b9e366be19b2f6f7efa4c21399528a4fef0978

      SHA512

      d0ec05bcf4965e8e199afb66c20c47b01da93ff9f917fede1e586bbd432cd0f3860af5f375e4de8c458713134a359a6988a6ae50e3e067bf763e94db22394e9d

    • C:\Windows\Installer\MSICD5D.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\temp\Autoit3.exe

      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • \??\c:\temp\script.a3x

      Filesize

      474KB

      MD5

      8ab7038b4c8bb4045439c34877b3d987

      SHA1

      8238100a487d9ccc7606109bd86f7b46a0fa3630

      SHA256

      f3de47b6e1d07ecb4cb3cb047eddeecfce0ed692963d1ae7ad59fad45794b995

      SHA512

      7894e8338a6d31f9ee0f43aafacae7e8c5845ed55c1b34b7d681820a5a2767f23bf693c225f0b001bb91a6149ecb9bbd5fdf86b4e46816cf585cd2116862e4d3

    • \??\c:\temp\test.txt

      Filesize

      76B

      MD5

      768de4581f6b36192556a9c8fea206fc

      SHA1

      f9b836dec6b1c7c02a81f3203fb659653229eb0f

      SHA256

      611decd13720d94bdb697f3b0d3831d80cbf5f564bdc7c81fad2339205dfb17b

      SHA512

      3e5a3d947584da521407c3eec2816e5bb038ea09f1e7f942a742a31ab0bd0edebd237e0b36a9e6799aa5adc60e1cdd247a1293b6c73908c4d4dc766c935ebd7b

    • \Users\Admin\AppData\Local\Temp\MW-51f20032-4ca0-49a1-9848-3a7039bb2f2c\files\CoreFoundation.dll

      Filesize

      1.2MB

      MD5

      44f2bff10caf25ba58f459e491853d70

      SHA1

      55b8a99caa5010b607b64015567b9248cd9be510

      SHA256

      3698042b056dc7d2882b84e9e9072408e65c852269adefa59abde90205e95637

      SHA512

      695853a26fef5c6b277e06160d637d4ad9c4529bf567ddf17956f8de396201fe738eae2e90b45f09ed1babf8f71624319771e30e858bd12c025e0ae2a99b0eb2

    • memory/1108-84-0x0000000074750000-0x0000000074905000-memory.dmp

      Filesize

      1.7MB

    • memory/1108-85-0x0000000002090000-0x0000000002230000-memory.dmp

      Filesize

      1.6MB

    • memory/1108-77-0x0000000002090000-0x0000000002230000-memory.dmp

      Filesize

      1.6MB

    • memory/1688-93-0x0000000004B60000-0x0000000004EBC000-memory.dmp

      Filesize

      3.4MB

    • memory/1688-92-0x00000000035D0000-0x00000000045A0000-memory.dmp

      Filesize

      15.8MB